Seeking Solutions to the Privacy Challenges of Emerging Technologies Blair Stewart, Assistant Privacy Commissioner Presentation to NZ Computer Society,

Slides:



Advertisements
Similar presentations
Anne Hurley, CEO Communications Alliance Seeing beyond the horizon CommsDay Summit 2008 Industry Futures Symposium.
Advertisements

Innovation and the Privacy Advantage Jennifer Stoddart, Privacy Commissioner of Canada August 25, 2010 Institute of Public Administration of Canada 62.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Security Controls – What Works
Modalities for exchanging census IT expertise in the region Ilpo Survo, United Nations ESCAP, Bangkok, for UNECE.
ICT Curriculum Evening – an introduction to Wizkid.
Telecommunication Development Bureau ITU and ICT Development Trieste, 9 February 2004 Hamadoun I. Touré Director BDT.
Introduction to the World of Computers
1 Introduction Lecture 1 CSCI 1405 Introduction to Computer Science Fall 2006.
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Geneva, Switzerland, November 2014 United Arab Emirates Experience Ahmad Alshamsi Manager Type Approval, UAE TRA Combating.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Creating a service Idea. Creating a service Networking / consultation Identify the need Find funding Create a project plan Business Plan.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
CDU – School of Information Technology HIT241 Professional Practice… - Slide 1 IT Project Management ACS - Core Body of Knowledge In Australia in November.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
Introduction to the World of Computers
Chapter 12 The Macro Environment – Technological Influences
CHAPTER 10 Technology Issues.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Asian Personal Data Privacy.
IFHRO/AHIMA CONGRESS Washington DC 13 October 2004 Health information privacy A New Zealand Perspective Blair Stewart Assistant Privacy Commissioner New.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
World summit on the information society 1 WSIS: Internet Governance President of the WSIS Phase II Preparatory Committee Ambassador Janis Karklins April.
 The use of telecommunications technology to provide, enhance, or expedite health care services.  Accessing off-site databases, linking clinics or physicians'
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
Can there be privacy in networks ? Dr. Alexander Dix Berlin Commissioner for Data Protection and Freedom of Information Chairman of the International Working.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
Revalidation of nurses and midwives in the UK Yasmin Becker Assistant Director –Revalidation and Standards 9 October - NIPEC.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
GSC Global Standards Collaboration GSC August – 2 September 2005 Sophia Antipolis, France August 28 – September 2, ISACC Opening Plenary Presentation.
U.S. Department of Education Safeguarding Student Privacy Melanie Muenzer U.S. Department of Education Chief of Staff Office of Planning, Evaluation, and.
Consumer Protection Definition. 1 Current General Frameworks For CP. 2 Gaps/Risk areas in current Frameworks. 3 Consumer Protection Pillars. 4 NGN/Convergence.
Information Systems Education Conference - ISECON Ryerson University School of Information Technology Management The Use of Internet-based Tools.
What Does Next Generation Mean to Me?. Background NG911 is an Internet Protocol (IP)-based system that allows digital information (e.g., voice,
Raising Awareness in Sheffield Schools Autumn/Winter
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Human Rights Reporting: The Telecommunications Industry Dialogue Christine Diamente Alcatel-Lucent Head of Brand & Corporate Sustainability Ethical Corporation.
Information Security tools for records managers Frank Rankin.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Inter-American Telecommunication Commission
Inter-American Telecommunication Commission
MGMT 452 Corporate Social Responsibility
Information Destruction; 2017 and beyond!
Unit 36: Internet Server Management
GDPR Awareness and Training Workshop
Summary of issues and results from GSC-11 User Workshop
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Presentation transcript:

Seeking Solutions to the Privacy Challenges of Emerging Technologies Blair Stewart, Assistant Privacy Commissioner Presentation to NZ Computer Society, Wellington, 24 November 2005

Office of the Privacy Commissioner Technology Team

Origins of Privacy laws bound up with technology 1960s/70s – public concerns at computers and networks led to regulation of databases and ‘automatic processing of data’ NZ Example: Wanganui Computer Centre Act 1976

Origins of Privacy laws cont’d 1980s/90s – risks of inconsistent national privacy laws impeding transborder data flows led to common international principles NZ Example: Privacy Act 1993 repealed prescriptive 1976 Act and implements broad 1980 OECD principles

Origins of Privacy laws cont’d 1990s/2000s – new & converging technologies give rise to new wave of public concerns Consumer & citizen ‘trust’ central e.g. consumer mistrust as an inhibitor to e-commerce NZ Example: Government’s 2000 ‘e-vision’ acknowledged concerns that government might ‘know too much about people’ and ‘use that information inappropriately’ (safeguards were promised) NZ Privacy Act also provides data matching safeguards See also OPC UMR survey (September 2001, next slide)

Some current and emerging technology challenges to privacy Privacy issues can arise wherever personal information is processed, e.g.: – micro-level (e.g. genetic information) – national databases (e.g. the forthcoming ‘e- census’) –global (e.g. GPS, EPC/RFID, WHOIS) The International Working Group on Data Protection in Telecommunications offers a glimpse of technology and privacy issues

IWGDPT papers (2001/02/03) Data Protection aspects of digital certificates and public-key infrastructures Online Voting in Parliamentary and other Elections Privacy and location information in mobile communications services Web-based Telemedicine Use of unique identifiers in telecommunication terminal equipments: the example of Ipv6 Children’s Privacy On Line: The Role of Parental Consent Telecommunications surveillance Intrusion Detection systems (IDS) Privacy risks associated with introduction of ENUM service

IWGDPT papers (2004) Cyber Security Curricula Integrating National, Cultural and Jurisdictional (Including Privacy) Imperatives Means & Procedures to Combat Cyber-Fraud in a Privacy- Friendly Way Privacy & location information in mobile communications services Freedom of expression & right to privacy regarding on-line publications Privacy risks associated with wireless networks Privacy and processing of images and sounds by multimedia messaging services A future ISO privacy standard

IWGDPT some current topics (2005) Web browser caching in multi-user public access environments (cyber cafés) Speaker recognition and voice analysis technology Internet governance e.g. WSIS, WGIG, WHOIS Electronic health records Web-services Blogging Spam, Spy-ware RFID IP telephony (Voice over IP) Satellite technology for everybody’s desktop, geo-location technology

How are privacy commissioners (and others) responding to these challenges? The privacy commissioner ‘model’ is a multi-functional regulator combining: –Researcher and policy adviser –Educator –Rule maker –Investigator and dispute mediator (complaints ombudsman)

How are commissioners (and others) responding to these challenges? The elastic character of privacy, dynamic nature of technology and globalisation of information handling, make rigid and prescriptive solutions very difficult (and usually undesirable) Instead good privacy outcomes in the technology area are fostered by: –Better understanding the issues –Educating those involved –Building in privacy from the start

Understanding the issues Emerging technologies raise novel issues Commissioners try to understand the issues as early as possible by: –Keeping abreast of literature –Maintaining networks with technologists (one task of technology team) –Discussing issues, sharing experience (e.g. IWGDPT), using overseas commissioners as an advanced warning system –Promoting or undertaking research e.g. into privacy enhancing technologies (PETs)

Understanding issues, cont’d Others also researching the issues, and commissioners may collaborate e.g: –With academia e.g. UK ICO links with UMIST; VPC links with RMIT –With industry e.g. UK ICO links with HiSPEC; Ontario IPC work with PETTEP, IBM Privacy Research Institute External Advisory Board, joint projects with PWC

Educating those involved Privacy commissioners active in training and education e.g. Technology Team runs an occasional lunchtime ‘Technology & Privacy Forum’ (open to the public) and convenes an Information Matching Interest Group (public sector only) UK Commissioner had UMIST develop ‘Best Practice Guidance on Data Protection for Systems Designers’ (see HiSPEC site)

Privacy by design: building privacy in from the start Privacy commissioners internationally have called upon hardware and software manufacturers to incorporate privacy enhancing technologies – it is not just an issue for governments

Privacy by design cont’d Privacy impact assessment is recommended for new systems affecting the handling of personal information

Conclusions Technology and privacy are closely bound together We all want to make the most of new technologies However, we also want to preserve our privacy (some more than others) and protect our personal information Computer professionals have an important part to play in finding solutions to the new challenges

Some resources Office of the Privacy Commissioner IWGDPT Working Papers berlin.de/doc/int/iwgdpt/ berlin.de/doc/int/iwgdpt/ HiSPEC (Human issues in security and privacy in e-commerce) Privacy Enhancing Technology Testing & Evaluation Project (PETTEP) ID=1&P_ID=15495&U_ID=0 ID=1&P_ID=15495&U_ID=0

Any Questions?